SlideShare a Scribd company logo
Students, the
Internet &
COVID-19
PRESENTED BY AYUSH CHOPRA
With school closures and social distancing
measures to curb the spread of COVID-19, children
are spending more time than ever online.
As a result, students are getting more screen-time
than usual.
LET'S FACE IT
We must know...
Everything increased in today's scenarios
THEY CAN SCROLL BEFORE
THEY CAN CRAWL
UNDERSTANDING THE
CYBER WORLD
Cyber crimes can be defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or
loss, to the victim directly or indirectly, using modern telecommunication
networks such as Internet (networks including chat rooms, emails, notice
boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
DEFINING CYBER CRIME
TYPES OF CYBER CRIMES 
HACKING
The gaining of unauthorized access to data in a system or computer.
PHISHING
The fraudulent practice of sending emails purporting to be from reputable companies in order to
induce individuals to reveal personal information, such as passwords and credit card numbers.
IN-HOUSE MAINTENANCE
Presentations are communication tools.
PIRACY
The unauthorized use or reproduction of another's work.
VIRUSES
A piece of code which is capable of copying itself and typically has a detrimental effect,
such as corrupting the system or destroying data.
ONLINE FINANCIAL
TRANSACTIONS IN-HOUSE MAINTENANCE
Presentations are communication tools.
PHARMING
the fraudulent practice of directing Internet users to a bogus website that mimics the
appearance of a legitimate one, in order to obtain personal information such as
passwords, account numbers, etc.
IDENTITY THEFTS
The fraudulent acquisition and use of a person's private identifying information, usually
for financial gain.
COMPUTER ETHICS
Ethics means “What is wrong and What is
Right”. It is a set of moral principles that rule the
behaviour of individuals who use computers.
Computer ethics are a set of moral standards
that govern the use of computers, both
hardware and software.
ETHICS
COMPUTER ETHICS
ONE SHOULD NOT ...
Use a computer to harm other people.
Interfere with other people's computer work or files.
Use a computer to steal or bear false information.
Copy or use proprietary software for which you have
not paid for.
Use other people's computer resources without
authorisation or proper compensation.
Computer security, cybersecurity is the protection of computer
systems and networks from the theft of or damage to their hardware,
software or electronic data, as well as from the disruption or
misdirection of the services they provide.
To safeguard
cybersecurity
YOU SHOULD...
Install a good antivirus.
Update antivirus regularly.
Always scan external drives before using.
Should use recommended secured sites with lock
sign.
Hypertext Transfer Protocol Secure (HTTPS) is an
extension of the Hyper Text Transfer Protocol(HTTP). It
is used for secure communication over a computer
  network, and is widely used on the Internet.
SAFE EMAIL
PRACTICES
LIMIT PUBLIC INFORMATION
Attackers cannot target you if they don’t know your email
addresses. Don’t publish non-essential contact details on
your website or on any public directories, including phone
numbers or physical addresses.
CAREFULLY CHECK EMAILS
Phishing attacks are seldom perfectly executed. A bizarre
From address (e.g. service145@mail.145.com), unusual links
(e.g. amazon.net.ru), or a high number of typos or
formatting mistakes in the text. If it looks suspicious,
students should report it.
BEWARE OF LINKS & ATTACHMENTS
You should be sceptical anytime you receive an email from
an unknown sender. Do not click on links or download
attachments without verifying the source and establishing
the legitimacy of the link or attachment.
SAFE EMAIL PRACTICES
HOVER OVER HYPERLINKS
Never click on hyperlinked text without hovering your cursor
over the link first to check the destination URL, which should
appear in the lower corner of your window. Sometimes the
hacker might disguise a malicious link as a short URL.
NEVER ENTER YOUR PASSWORD
Unless you’re 100% certain the website is legitimate, you
should never enter your password anywhere. If you aren’t
logging into your account and you haven’t requested to
reset your password, then password reset links are likely
part of a phishing attack.
ONLINE PREDATORS 
As per Indian Information Technology Act, 2000, the
significant aspect of Section 67B seeks to protect
children. This law penalizes any and every person who
facilitates the abuse of children online.
Online Predators are individuals who commit child
sexual abuse that begins or takes place on the internet.
Chat rooms, instant messaging, Internet forums, social
networking sites, cell phones have issues with online
predations.
While practicing Social Distancing, Social networking sites like Facebook,
Instagram, Twitter, Whatsapp etc can be a great way to connect with friends.
But there are some social networking safety tips you should always keep in
mind.
SAFE SOCIAL
NETWORKING
BEST PRACTICES
REMEMBER ONCE POSTED, ALWAYS
POSTED .. MAINTAIN GOOD DIGITAL
FOOTPRINTS
Protect your reputation on social networks. What you post
online stays online. Think twice before posting pictures
you wouldn't want your parents or future employers to
see. Recent research found that 70% of job recruiters
rejected candidates based on information they found
online.
MANAGE YOUR PRIVACY SETTINGS
Learn about and use the privacy and security settings on your
social networking sites. They help you control who sees what you
post and manage your online experience in a positive way.
KEEP PERSONAL INFO PERSONAL
Be careful how much personal info you provide on social networking sites. The more information
you post, the easier it may be for someone to use that information to steal your identity, access
your data, or commit other crimes such as stalking.
USE STRONG PASSWORDS
Make sure that your password is at least eight characters long and consists of some
combination of letters, numbers, and special characters (for example, +, @, #, or $).
SAFE SOCIAL NETWORKING
BEST PRACTICES
KNOW WHAT ACTION TO TAKE
If someone is harassing or threatening you, remove them from your friends list, block them,
and report them to the site administrator.
SELECT BLOCKING
Block specific users or application invitations
SAFE SOCIAL NETWORKING
DOCUMENTED PROOF
Remember whatever you write on social site is a
Documented proof of what you have expressed
and will remain there for ever and may be used
as an evidence against you in future.
ACCEPTED THE TERMS
Remember that legally you have accepted the
terms while signing up the social networking site. So
abide by the discipline.
Cyber Bullying
Cyber Bullying
REACH MEFACEBOOK
https://www.facebook.com/wizardayush
https://www.facebook.com/SDGsForChildren
TWITTER
https://twitter.com/ayushchopra24
https://twitter.com/SDGsForChildren
INSTAGRAM
https://www.instagram.com/wizardayush
https://www.instagram.com/sdgsforchildren
http://www.SDGsForChildren.org
Thank you!
WHAT GOES ON INTERNET, STAYS ON INERNET!

More Related Content

What's hot

Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
Harsh Tekriwal
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
NetLockSmith
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
Manjula Sridhar
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Revolucion
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Anuj Bhardwaj
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 

What's hot (18)

Phishing
PhishingPhishing
Phishing
 
Facebook
FacebookFacebook
Facebook
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 

Similar to Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
AbdalrhmanTHassan
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HemantSharma134028
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdf
marissaramos007
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
Amir Bouker
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
ReinIgnacioUrolaza
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
vjom
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
Kanishk Raj
 

Similar to Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1 (20)

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdf
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1

  • 2. With school closures and social distancing measures to curb the spread of COVID-19, children are spending more time than ever online. As a result, students are getting more screen-time than usual. LET'S FACE IT
  • 3. We must know... Everything increased in today's scenarios
  • 4. THEY CAN SCROLL BEFORE THEY CAN CRAWL
  • 6. Cyber crimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)". DEFINING CYBER CRIME
  • 7. TYPES OF CYBER CRIMES 
  • 8. HACKING The gaining of unauthorized access to data in a system or computer. PHISHING The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. IN-HOUSE MAINTENANCE Presentations are communication tools. PIRACY The unauthorized use or reproduction of another's work. VIRUSES A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  • 9.
  • 10.
  • 11. ONLINE FINANCIAL TRANSACTIONS IN-HOUSE MAINTENANCE Presentations are communication tools. PHARMING the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc. IDENTITY THEFTS The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  • 12. COMPUTER ETHICS Ethics means “What is wrong and What is Right”. It is a set of moral principles that rule the behaviour of individuals who use computers. Computer ethics are a set of moral standards that govern the use of computers, both hardware and software. ETHICS
  • 13. COMPUTER ETHICS ONE SHOULD NOT ... Use a computer to harm other people. Interfere with other people's computer work or files. Use a computer to steal or bear false information. Copy or use proprietary software for which you have not paid for. Use other people's computer resources without authorisation or proper compensation.
  • 14. Computer security, cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software or electronic data, as well as from the disruption or misdirection of the services they provide.
  • 15. To safeguard cybersecurity YOU SHOULD... Install a good antivirus. Update antivirus regularly. Always scan external drives before using. Should use recommended secured sites with lock sign. Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hyper Text Transfer Protocol(HTTP). It is used for secure communication over a computer   network, and is widely used on the Internet.
  • 16. SAFE EMAIL PRACTICES LIMIT PUBLIC INFORMATION Attackers cannot target you if they don’t know your email addresses. Don’t publish non-essential contact details on your website or on any public directories, including phone numbers or physical addresses. CAREFULLY CHECK EMAILS Phishing attacks are seldom perfectly executed. A bizarre From address (e.g. service145@mail.145.com), unusual links (e.g. amazon.net.ru), or a high number of typos or formatting mistakes in the text. If it looks suspicious, students should report it. BEWARE OF LINKS & ATTACHMENTS You should be sceptical anytime you receive an email from an unknown sender. Do not click on links or download attachments without verifying the source and establishing the legitimacy of the link or attachment.
  • 17. SAFE EMAIL PRACTICES HOVER OVER HYPERLINKS Never click on hyperlinked text without hovering your cursor over the link first to check the destination URL, which should appear in the lower corner of your window. Sometimes the hacker might disguise a malicious link as a short URL. NEVER ENTER YOUR PASSWORD Unless you’re 100% certain the website is legitimate, you should never enter your password anywhere. If you aren’t logging into your account and you haven’t requested to reset your password, then password reset links are likely part of a phishing attack.
  • 18. ONLINE PREDATORS  As per Indian Information Technology Act, 2000, the significant aspect of Section 67B seeks to protect children. This law penalizes any and every person who facilitates the abuse of children online. Online Predators are individuals who commit child sexual abuse that begins or takes place on the internet. Chat rooms, instant messaging, Internet forums, social networking sites, cell phones have issues with online predations.
  • 19. While practicing Social Distancing, Social networking sites like Facebook, Instagram, Twitter, Whatsapp etc can be a great way to connect with friends. But there are some social networking safety tips you should always keep in mind.
  • 20. SAFE SOCIAL NETWORKING BEST PRACTICES REMEMBER ONCE POSTED, ALWAYS POSTED .. MAINTAIN GOOD DIGITAL FOOTPRINTS Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn't want your parents or future employers to see. Recent research found that 70% of job recruiters rejected candidates based on information they found online. MANAGE YOUR PRIVACY SETTINGS Learn about and use the privacy and security settings on your social networking sites. They help you control who sees what you post and manage your online experience in a positive way. KEEP PERSONAL INFO PERSONAL Be careful how much personal info you provide on social networking sites. The more information you post, the easier it may be for someone to use that information to steal your identity, access your data, or commit other crimes such as stalking.
  • 21. USE STRONG PASSWORDS Make sure that your password is at least eight characters long and consists of some combination of letters, numbers, and special characters (for example, +, @, #, or $). SAFE SOCIAL NETWORKING BEST PRACTICES KNOW WHAT ACTION TO TAKE If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator. SELECT BLOCKING Block specific users or application invitations
  • 22. SAFE SOCIAL NETWORKING DOCUMENTED PROOF Remember whatever you write on social site is a Documented proof of what you have expressed and will remain there for ever and may be used as an evidence against you in future. ACCEPTED THE TERMS Remember that legally you have accepted the terms while signing up the social networking site. So abide by the discipline.
  • 24.
  • 25.
  • 27.
  • 29. Thank you! WHAT GOES ON INTERNET, STAYS ON INERNET!